Results 31 to 40 of about 640,321 (187)

Satellite Quantum Communications When Man-in-the-Middle Attacks Are Excluded [PDF]

open access: yesEntropy, 2019
An application of quantum communications is the transmission of qubits to create shared symmetric encryption keys in a process called quantum key distribution (QKD). Contrary to public-private key encryption, symmetric encryption is considered safe from (quantum) computing attacks, i.e.
Tom Vergoossen   +3 more
openaire   +4 more sources

A Novel Protocol-Authentication Algorithm Ruling Out a Man-in-the-Middle Attack in Quantum Cryptography

open access: yes, 2004
In this work we review the security vulnerability of Quantum Cryptography with respect to "man-in-the-middle attacks" and the standard authentication methods applied to counteract these attacks.
Fedrizzi, A.   +8 more
core   +1 more source

Pengamanan Pesan Komunikasi Menggunakan Algoritma Rsa, Rabbin Miller dan Fungsi Sha-1 Serta Penanganan Man In The Middle Attack dengan Interlock Protocol [PDF]

open access: yes, 2018
Komunikasi informasi saat ini telah berkembang dengan luas. Komunikasi informasi baik dalam bentuk saling bertukar pesan, transaksi sampai pertukaran informasi rahasia telah menggunakan teknologi komputer dan jaringan global yang luas dan kompleks ...
Sinaga, S. B. (Sony)
core   +2 more sources

A lightweight authentication mechanism for M2M communications in industrial IoT environment [PDF]

open access: yes, 2017
In the emerging Industrial IoT era, Machine-to-Machine (M2M) communication technology is considered as a key underlying technology for building Industrial IoT environments where devices (e.g., sensors, actuators, gateways) are enabled to exchange ...
Bastos, Joaquim   +9 more
core   +4 more sources

Preventing man-in-the-middle attacks in DNS through certificate less signature

open access: yes网络与信息安全学报, 2021
Aiming at resisting the man-in-the-middle attacks in the domain name system protocol, a lightweight solution was proposed.The scheme introduced certificate less signature algorithm, removed the difficult-to-deploy trust chain to improve the efficiency ...
Yang HU   +3 more
doaj   +3 more sources

Key exchange with the help of a public ledger

open access: yes, 2017
Blockchains and other public ledger structures promise a new way to create globally consistent event logs and other records. We make use of this consistency property to detect and prevent man-in-the-middle attacks in a key exchange such as Diffie-Hellman
A Shamir   +9 more
core   +1 more source

IoT and Man‐in‐the‐Middle Attacks

open access: yesSECURITY AND PRIVACY
ABSTRACTThis article provides an overview of the Internet of things (IoT) and its growing significance in today's interconnected world. It discusses the concept of man‐in‐the‐middle (MitM) attacks in detail, including their various types, causes, and potential impacts on IoT networks.
Hamidreza Fereidouni   +2 more
openaire   +2 more sources

Verifiable three-party secure key exchange protocol based on eigenvalue

open access: yesTongxin xuebao, 2019
In order to solve the problem that the traditional key exchange protocol,which was not flexible enough and flawed in security,cannot provide the function of three-party key negotiation,firstly,a simple and flexible three-party key exchange scheme that ...
Yanshuo ZHANG   +3 more
doaj   +2 more sources

Penetration Testing of GSM Network using Man-In-The-Middle Attack [PDF]

open access: yesJES: Journal of Engineering Sciences
Even though wireless communication technologies have advanced beyond the Global Systems for Mobile (GSM) Communications standard to mitigate its vulnerabilities, it is still a fallback technology when the coverage is limited and modern protocols aren’t ...
Nosa Bello, Ogechukwu Kanu
doaj   +1 more source

Support Vector Machine Prediction a Man in the Middle Attack on Traffic Networking

open access: yesمجلة النهرين للعلوم الهندسية
The goal of the study is to predict the Man in the Middle attack in the packets of Wireshark program by using Support Vector Machines (SVM).In the time of using the internet, it has become a tool targeted by attackers and hackers; it is a serious threat
Nahla Ibraheem Jabbar
doaj   +1 more source

Home - About - Disclaimer - Privacy